News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Industry: Cyber ​​attacks are becoming more frequent and expensive
Industry: Cyber ​​attacks are becoming more frequent and expensive

Sophos presents the results of the latest State of Ransomware Report for the manufacturing industry. There is no relief in sight: Attacks are becoming more frequent and more sophisticated, while ransom demands have risen to an average of $1,2 million and recovery from an attack is taking longer and longer. Cybercrime is one of the biggest business-damaging risks facing organizations across all industries. But there are definitely differences between the various market segments. In a global study, the cyber security company Sophos has determined how the threat posed by cyber gangsters is currently affecting the manufacturing industry. Disturbing stagnation The supposed…

Read more

Wanted: security solutions for private 5G networks
Wanted: security solutions for private 5G networks - Image by Cliff Hang from Pixabay

Businesses are looking for security solutions that seamlessly integrate with existing 5G technologies. According to Trend Micro, the market for cybersecurity of private 5G networks will grow to $2027 billion by 12,9. Trend Micro publishes the results of its new report "Beyond Secure by Default" in cooperation with the analyst house Omdia. The study shows that the majority of companies invest 5 to 10 percent of their IT budget specifically in the security of private 5G networks, although they assume that the technology is already more secure by default than previous standards such as 3G, 4G and LTE. More safety…

Read more

Google Bard as malware author
Google Bard as malware author

Security researchers were able to use Google's generative AI Bard to generate phishing emails, malware keyloggers and simple ransomware code. The Generative AI revolution has sparked a paradigm shift in the field of artificial intelligence, enabling machines to create and generate content with remarkable sophistication. Generative AI refers to the subset of AI models and algorithms capable of autonomously generating text, images, music, and even videos that mimic human creations. This breakthrough technology has opened up a multitude of creative possibilities, from supporting artists and designers to…

Read more

NIS2 for the security of the industrial sector
NIS2 for the security of the industrial sector

Manufacturing is a crucial part of the European economy and encompasses many areas from small-scale production to large-scale industrial processes. NIS2 aims to reduce cybercrime losses. As the sector becomes more digitized and connected, it faces increasing cybersecurity risks that could have serious consequences for public health and safety. To address these risks, the NIS2 directive classifies manufacturing organizations as critical entities and establishes new cybersecurity requirements that must now be met. The great relevance of…

Read more

Accomplice AI: Theft of identity data 
Accomplice AI: Theft of identity data - Image by Eric Blanton from Pixabay

Identity data has always been one of cybercriminals' favorite loot. With their help, account compromises can be initiated and identity fraud committed. Now ChatGPT & Co are also helping with perfect phishing emails. A statement from Dirk Decker, Regional Sales Director DACH & EMEA South at Ping Identity. The attackers usually use social engineering and phishing. The success rate of such attacks, mostly based on sheer mass, is limited. Individualized emails and messages tailored to a victim offer significantly higher success rates, but also require significantly more work...

Read more

All about the CISO
All about the CISO

What does a CISO need to have? In today's threat landscape, Chief Information Security Officers have a significant responsibility. Taking on the role of a CISO just like that is not a good idea. They have a major influence on the company and must regularly demonstrate their worth and competence. Just stumbling into the CISO role isn't the best option, because if you want to advance a career in cybersecurity, you should prepare well. This guide provides information to help you clearly define your path to becoming the in-demand CISO that…

Read more

Security report Q1/23: New malware often from Russia and China 
Security report Q1/23: New malware often from Russia and China - Image by Egonetix_xyz on Pixabay

Cyber ​​attackers are constantly coming up with new attack methods. The security report for the first quarter of 1 not only shows new traps, but also proves that three of the four newcomers on the top 2023 malware list come from Russia and China. According to WatchGuard's Internet Security Report, attackers are now discovering new ways to trick users surfing the Internet. After web browsers have recently upgraded their protection mechanisms against pop-up abuse, cybercriminals are now focusing on the still relatively new browser notification options. Malware trends for Q10/1 How the analysis…

Read more

Zero Trust Best Practices
Zero Trust Best Practices

The rapid shift towards more remote work and the associated explosion in devices has dramatically increased the number of cyber threats. With this in mind, organizations face the challenge of protecting their highly complex cloud-based technology ecosystems as people, software and even partner organizations can pose a threat to the security of valuable systems and data. As a result, the Zero Trust approach has established itself as a popular security framework. Analyst firm Markets and Markets forecasts that global spending on Zero Trust-based software and services will grow to $27,4 billion in 2022 from $60,7 billion.

Read more

DACH: 55 percent victims of spear phishing
DACH: 55 percent victims of spear phishing

In the DACH region, 55 percent of companies have been victims of a spear phishing attack in the last 12 months, according to the new Barracuda Networks Spear Phishing Trends Report 2023. DACH was thus slightly above the average in an international comparison (50 percent). In addition, 24 percent of all companies had at least one email account affected by an account takeover. Cyber ​​criminals send an average of 370 malicious emails from each compromised account. The report includes Barracuda spear phishing data and analysis based on a dataset covering 50 billion emails across 3,5 million mailboxes, including nearly 30 million spear phishing emails. In addition…

Read more

FIN study: Significant increase in hacker attacks

Banks and insurers have been among the preferred targets of hackers for years. The study "From Cyber ​​Security to Cyber ​​Resilience - Strategies for Dealing with an Increasing Threat Situation" provides insights into the state of cyber resilience of companies in Germany. Although financial service providers are often better positioned in terms of cyber security, there is still a lot to be done to achieve solid cyber resilience. The specialist magazine "CSO Online" has listed more than 30 cyber attacks on companies in various sectors since the beginning of the year. However, the number of unreported cases is likely to be higher. The new study "From Cyber ​​Security to Cyber...

Read more